RFID

back to index

description: technology using electromagnetic fields to automatically identify and track tags attached to objects

175 results

You Are Here: From the Compass to GPS, the History and Future of How We Find Ourselves

by Hiawatha Bray  · 31 Mar 2014  · 316pp  · 90,165 words

Antonio, Texas, have fared much better in defending a surveillance technology that is far more common and arguably even more intrusive—radio-frequency identification. The RFID concept dates back to World War II and Robert Watson-Watt, the British radar pioneer we met in Chapter 2. Watson-Watt realized that in

signal confirming their identities. The IFF system was the forerunner of the transponders on today’s commercial planes that identify the aircraft to ground controllers. RFID is a modernized, miniaturized version of the same idea. A small microchip with attached radio antenna can be embedded into an ID card or glued

onto a package. This device sits inert until it comes within range of a “reader” that broadcasts a radio signal. The incoming signal alerts the RFID chip, which responds by beaming out a serial number. This serial number has already been stored in a database, where it is associated with a

particular object or person. So when the RFID reader at a supermarket warehouse picks up the serial number of an RFID chip attached to a box of spaghetti sauce, it notifies the warehouse’s inventory computer that the sauce has

arrived. With RFID you do not need warehouse workers typing in the data as new shipments arrive. You just put RFID readers at each loading dock; the merchandise logs itself into inventory as it is brought into the

to stores. Retailers like Walmart who want to control labor costs depend quite heavily on RFID systems; so do manufacturers like airplane builders Boeing and Airbus, which use RFID tags to track vast inventories of spare parts.17 RFID chips also simplify many everyday human transactions. In Boston commuters use cards with embedded

RFID chips to pay their fares by simply waving them in front of a detector. Millions of

people pay their highway tolls with an RFID-based “EZ Pass” that identifies the driver and sends him a bill each month

. And many employers issue RFID-based identification cards to unlock the office door and confirm the worker is on the job

. Plainly, RFID enables location tracking at its most granular level, even when it was not deployed for that purpose

divorce lawyer that you were not working late at the office that night.18 On an even more granular level, retailers have taken to attaching RFID tags to individual items in their stores as a precise tool for tracking inventories. Some civil libertarians fear that it is the first step in

a process to track nearly every aspect of our lives—for example, RFID chips woven into clothing would constantly transmit our comings and goings. RFID industry executives say they are not interested. Still, in their 2005 book, Spychips, Katherine Albrecht and Liz McIntyre uncovered

US companies suggesting that they have at least been thinking about it. For instance, in 2001 IBM filed a patent on a way of using RFID tags to track people inside “shopping malls, airports, train stations, bus stations, elevators, trains, airplanes, rest rooms, sports arenas, libraries, theaters, museums, etc.” IBM has

not followed through on the idea, at least not yet.19 Some RFID applications are intended to keep track of the holders’ whereabouts. Sometimes it is an imprecise, soft form of tracking. Use an

RFID name badge to enter your office or clock in at the factory, and the company has a record that you showed up that day. Still,

that probably does not mean your movements inside the building are being constantly monitored. Most RFID tags are “passive.” They are incapable of transmitting radio messages on their own because they do not include a battery to power up the chip

. Instead, passive tags come to life only when they are near an RFID reader. As the chip approaches the reader, it scavenges power from the incoming radio signal—enough for it to answer back with the chip’s

ID code. Because the reader’s radio signal is weak, passive RFID chips respond only when they are close to the reader—usually within a few yards or a couple of feet.20 Plainly, such tags cannot

every important room. Now a bank’s security system knows when a particular worker enters the vice president’s office or walks into the vault. RFID systems can be made far more intrusive by deploying tag readers in every room, even in places where workers might expect some privacy. Back in

2004 a company called Woodward Laboratories introduced iHygiene, an RFID-equipped soap dispenser for the bathrooms of fast-food restaurants. The iHygiene dispenser would detect the RFID badge of any employee using the room. If that worker departed without putting soap on his hands

, iHygiene would send a signal via Wi-Fi to the store manager’s computer. Happily, the product never caught on.21 Another version of RFID could prove even more intrusive. Add a small battery, and you can create an “active” tag that would transmit a signal for dozens of feet

location only when he is passing near a reader. With its much longer range, an active RFID chip can keep a worker constantly on the company radar. Hospitals have led the way in using active RFID systems designed to constantly track the location of people and equipment. However, results have been decidedly

mixed. RFID signals are often far less precise than advertised, so that tagged people and items cannot be

a “Big Brother” environment of constant surveillance.22 Schools, however, are not hospitals, and most adults would happily keep their kids under constant surveillance. Active RFID systems are gradually being deployed in schools. Children are issued chip-enhanced ID badges that signal a badge reader mounted on the schoolhouse door or

school. “We don’t want it to be Big Brother,” said Kayode Aladesuyi, the chief executive officer of StudentConnect, of Marietta, Georgia, a vendor of RFID systems for schools. “We want it to be information that parents are using for the enhancement of the kids’ education and for their safety.” For

small children were left behind on school buses because drivers had lost track of how many had boarded. An RFID-equipped bus would ensure this never happened, according to Aladesuyi. By combining RFID with a GPS system to track the bus itself, administrators and parents could know the child’s exact location

during the commute to and from the school.23 At John Jay High School in San Antonio, Texas, RFID tracking was embraced to protect the students and the district’s budget. State funding is based on daily attendance, as measured by an old-fashioned

gets less money, but a school can increase its income by thousands of dollars per year by making sure every child is counted. With an RFID system, that becomes child’s play; as soon as a kid walks through the door, he is logged in. Drawn by the lure of extra

funding, two of the district’s schools adopted an RFID system in the autumn of 2012. Administrators expected no objections from students or parents. More important, they did not count on the Hernandez family, a

devoutly religious brood of a fundamentalist bent. Brought up on a literalistic reading of the biblical book of Revelation, sophomore Andrea Hernandez believed that the RFID tag was “the mark of the beast” described in chapter 13 of that apocalyptic work. This beast, one of two blasphemous enemies of God described

a greater weight of cosmic significance than a plastic ID badge can bear. Yet the Hernandez family was convinced that an order to wear an RFID tag amounted to an effort to force the mark of the beast on Andrea. In August 2012, Andrea’s father, Steven, wrote to the school

is not rare in Texas, the school board offered a substantial compromise. They agreed to issue Andrea an ID badge that would not contain an RFID chip, rendering her movements untraceable. It was not good enough for the Hernandez family, who said that even without the chip inside, wearing the badge

federal judge ruled that Hernandez must wear the badge or seek another school. Hernandez transferred to a different San Antonio high school, one free of RFID badges. But Hernandez has since returned to John Jay High. In July 2013 the school district announced that it would stop using the badges, having

decided that the RFID system did not measure up to their expectations. It is not exactly a great victory for privacy, though. The school has instead placed video cameras

throughout the school—two hundred of them.25 Few students or parents share the Hernandez family’s fervent religious objections to RFID, but they still mustered plenty of support from civil liberties organizations, including the Electronic Frontier Foundation, the Electronic Privacy Information Center, and the American Civil

students, that it may dissuade them from seeking advice from school counselors for fear that their visits will be monitored, that unauthorized persons armed with RFID readers could monitor students even when they leave the campus.26 Perhaps the most troubling aspect is the way that constant tracking of students conditions

on You,” San Diego CityBeat, February 20, 2013, www.sdcitybeat.com/sandiego/article-11511-license-plate-recognition-has-its-eyes-on-you.html. 17. “Report: RFID Market to Surpass $26B in 2022,” Security Sales and Integration, July 19, 2012, www.securitysales.com/channel/vertical-markets/news/2012/07/19/report

-rfid-market-to-surpass-26b-in-2022.aspx. See also Joanne Perry, “RFID Developments,” Aircraft Technology (December 2012–January 2013): 56–61. 18. Hal Abelson, Ken Ledeen, and Harry Lewis, Blown to

River, NJ: Addison-Wesley Professional, 2008), 36–38. 19. Katherine Albrecht and Liz McIntyre, Spychips (Nashville: Thomas Nelson, 2005), 35. 20. Jerry Banks et al., RFID Applied (New York: John Wiley and Sons, 2007), 8–10. 21. Albrecht and McIntyre, Spychips, 177. 22. Torin Monahan and Jill A. Fisher, “Surveillance Impediments

. Hernandez v. Northside Independent School District, US District Court, Western District of Texas, SA-12-CA-1113-OG. 25. Will Oremus, “Texas School District Drops RFID Chips, Will Track Kids with Surveillance Cameras Instead,” July 17, 2031, www.slate.com/blogs/future_tense/2013/07/17/texas_northside_school_district_drops

_privacy_not_the_main.html. 26. “Consumers Against Supermarket Privacy Invasion and Numbering,” Position Paper on the Use of RFID in Schools, www.spychips.com/school/RFIDSchoolPositionPaper.pdf. 27. Gilliom and Monahan, SuperVision, 78–79. 28. See Electronic Communications Privacy Act Amendments Act of 2013,

problems with, 36, 38–39 proximity fuse and, 20, 41–45, 77–78 radar and, 40–41 radio detection and, 36–45 radio-frequency identification (RFID) and, 219–225 satellites and, 20, 77–78, 81–82 spark-gap experiments and, 21–22, 23 telegraph and, 22–23 World War I and

, 24, 25–31, 34, 37, 38 World War II and, 39, 40–45 Radio-frequency identification (RFID), 219–225 Rainert, Alex, 196–197 RAND Corporation, 158–160, 162 Randall, John, 39 Raytheon Company, 92, 167 RCA, 85 Reagan, Ronald, 105, 106 Reagan

administration, 165 Relativity, 67, 68, 101, 102 Religious belief, 223–224 Research in Motion, 117 Revelation, 223–224 RFID. See Radio-frequency identification Rigmaiden, Daniel David, 217–218 Roberts, John, 214 Roberts, Richard, 42 Robertson Aircraft, 34 Rockwell International, 104 Roosevelt, Franklin D., 40

implications of, 209–210, 225–227 license-plate recognition (LPR) systems and, 218–219 locational privacy and, 210–212 “passive,” 221–222 radio-frequency identification (RFID) and, 219–225 in schools, 222–225 in workplace, 222 Taylor, Albert Hoyt, 37–38 Telegraph system, 22–23 Tendler, Robert, 114–115 Terrorism, 27

Smart Grid Standards

by Takuro Sato  · 17 Nov 2015

ISO ISO 14443 ISO ISO 15693 ISO ISO 15961 ISO ISO RFID standard for close coupled cards ISO RFID standard that defines the way in which data is structured on an RFID tag ISO RFID standard that defines the air interface protocol ISO RFID standard that provides the definitions for the air interface protocol for

RFID tags used in proximity systems – aimed for use with payment systems ISO

RFID standard for use with what are termed vicinity

cards ISO RFID standard for item management (includes application interface (part 1), registration

of RFID data constructs (part 2), and RFID data constructs (part 3) Communications in the Smart Grid 253 Table 6.2

D7434 ASTM ASTM D7435 ASTM ASTM D7580 ASTM JIS X 6319-4 JIS ISO/IEC 21481 ISO ISO/IEC 18092 ISO ISO RFID standard for the air interface for RFID frequencies around the globe Air interface commands for battery assist and sensor functionality Physical and logical requirements for a passive-backscatter, Interrogator

-Talks-First (ITF), Radio-Frequency Identification (RFID) system operating in the 860–960 MHz frequency range Physical and logical requirements fora passive-backscatter, Interrogator-Talks-First (ITF), Radio-Frequency Identification

(RFID) system operating in 13.65 MHz frequency Standard test method for determining the performance of passive Radio-Frequency Identification (RFID) transponders on palletized or unitized loads Standard test method for determining the performance of passive Radio

-Frequency Identification (RFID) transponders on loaded containers Standard test method for rotary stretch wrapper method for determining the readability

of passive RFID transponders on homogeneous palletized or unitized loads Also known as “Felica,” the Japanese Industrial Standard (or

, we provide an overview of those technologies in the context of Smart Grid applications. 6.4.2 Wireless Very Short Distance Communication Radio-Frequency Identification (RFID) technology is widely used for identifying and tracking assets, because of its simplicity and low cost. In particular, the most common applications of

RFID are store/warehouse product identification, production control, livestock identification, and vehicle tracking. The RFID concept recognizes two entities: reader/writer and a tag. The RFID reader/writer communicates with RFID tags and reads/writes the information from/to the tag. There can

be three different types of RFID tags: passive, semipassive, and active. The passive RFID tags take the major market share due to the extremely low cost without

the need for any battery and with almost limitless lifespan. The passive RFID tag is powered by the antenna of a reader/writer device. Semipassive tags are battery powered for internal operation. However, the read or write process

method as a passive tag (powering from the antenna of the reader/writer). Finally, an active RFID tag is powered by battery and enables significantly larger distances for communication. There are several standards defining RFID technologies and the way in which two entities interact (an antenna-coupling mechanism). The most common methods

are RFID inductive coupling, RFID capacitive coupling, and RFID backscattering. Every coupling method has different features and varies in range, frequencies, and Unlicensed Wi-FI alliance Bluetooth SIG Wi-Fi Bluetooth (BT) Unlicensed 2.

LAN LAN LAN PAN, LAN Low PAN PAN PAN PAN, BAN No Network type ISO/IEC, ASTM, EPCGlobal NFC forum IEEE Range/ Security coverage Mobility RFID Wireless technology Spectrum Frequency Data rates Overview of various wireless technologies and their characteristics Technology SDO/ consortium Table 6.8 Communications in the Smart Grid

Table 6.9 An overview of various wireless technologies and their applications in the Smart Grid Wireless technology Standard family Smart Grid characteristics Communication type RFID NFC IEEE 802.15.4 IAN, BAN, HAN IAN, BAN, HAN HAN, BAN, IAN, NAN ZigBee HAN, IAN, BAN, NAN Wave2M IEEE 802.15.4

interface for remote distribution substation 274 Smart Grid Standards transmission data rates. There are more than 20 international standards defining RFID technologies. The ISO 18000 set of standards defines air interfaces for RFID, with allowed frequencies in different regions. Besides various ISO standards, there is also the EPCglobal standardization body defining Electronic

Product Code (EPC) Class-1 HF RFID standard [53] and the newer UHF Class-1 “Gen 2” standard [54]. The EPC Class-1 HF air radio interface is another important ISO standard

that is compatible with ISO 15693 and utilizes RFID inductive coupling. Inductive coupling utilizes the near-field effect. In order to power the tag circuitry, the distance (range) between reader/writer and the tag

card emulation mode, peer-to-peer mode, and reader/writer mode. In the card emulation mode, NFC behaves like RFID and the NFC standard can be seen as an extension of RFID technology. NFC was originally developed by Sony and NXP Semiconductors. Currently, there are several NFC technologies and standards. NFC has

been standardized under ISO/IEC 18092 international standard (mirrored in ECMA-340) and is compatible with several proprietary as well as open RFID technology standards for communication. FeliCa is Japanese Industrial Standard (JIS) X 6319-4, (also called NFC-F), which is developed by Sony and widely used

the rapid growth of smartphones and other devices with embedded NFC capabilities, which opens new opportunities for various services offered directly to the end users. RFID and NFC technologies are considered a key solution for access of reading data from smart meters by consumers and utility companies, and many other applications

Launch Global M2M Platform, 5 December 2012, www .nttdocomo.com/pr/2012/001622.html (accessed 13 January 2013). [53] EPCglobal (2011) EPC Class-1 HF RFID Air Interface Protocol for Communications at 13.56 MHz, GS1 EPCglobal. [54] EPCglobal (2008) Class-1 Generation-2 UHF

RFID Protocol for Communication at 860 MHz – 960 MHz, GS1 EPCglobal. [55] Google (2012) Google Wallet, www.google.com/wallet/how-it-works/in-store.html (

6 Chapter 6 Chapter 6 Location in this book 442 List of Standards for the Smart Grid Communications Communications Communications Communications EPC Class-1 HF RFID air interface protocol for communications at 13.56 MHz: it defines physical and logical requirements for a passive-backscatter, Interrogator-talks-first (ITF), radio-frequency

identification (RFID) system operating at 13.65 MHz frequency GMR/ETSI TS 101 GEO-mobile radio interface 376 specifications: it defines geostationary earth orbit mobile radio interface

(PHS), 146, 147 Narrowband PLC, 251, 260 National Electrical Manufactures Association (NEMA), 11 National Institute of Standards and Technology (NIST), 7, 264 Radio frequency identification RFID, 270 Range anxiety, 161 Registration Process (RP), 221 RPL, 258, 259, 283 Index Safety integrity level, 322 Sampled Measured Values (SMV), 82 Sampling value (SV

Industry 4.0: The Industrial Internet of Things

by Alasdair Gilchrist  · 27 Jun 2016

, such as sensors for acceleration, location, along with communication protocols that support Wi-Fi, SMS, and cellular. They also have NFC (near field communication) and RFID (radio frequency identification), both of which can be used for identification. Consequently, the smartphone provides the means to capture data and communicate information. Also, the

and this is really where the office does become intelligent or “smart”. In this scenario, a user is identified by his mobile phones, NFC, or RFID, and the control management system will adjust the environment to the user’s pre-set or machine learned preferences, such as temperature or light levels

that provide the user with a welcoming ambience. When a visitor arrives, detected again by RFID on their mobile phone, the CMS can turn on the lights in the reception area and play music and video, again to provide a welcoming

address these inventory control processes, logistic companies sought an automated solution using IIoT techniques and wireless technologies. The solution is to use embedded RFID tags and the associated RFID readers, which can scan entire rows or stacks of pallets queued at the inbound gate simultaneously. This is something a barcode reader had

to perform one at a time, which is an improvement in speed and accuracy as every RFID tag in 23 24 Chapter 2 | Industrial Internet Use-Cases radio range on every pallet, whether visible or not, is read by the system. The

RFID reader automatically records the RFID tag’s information such as the order ID, the manufacturer, product model, type, and quantity, as well as the condition of the items

and send information regarding the environmental storage conditions. This allows warehouse staff to take action before the stock becomes damaged. Another major benefit of using RFID tags is that they allow for fast and accurate audits of stock. Stock level is managed through an ERP application interfacing with the

RFID readers, so changes in stock levels are updated automatically and stock levels are continuously updated and discrepancies are immediately alerted. Similarly, for outgoing stock control

when an order is dispatched, an RFID tag reader can read all of the pallet tags as they pass through the outbound gates and automatically adjust the stock holding for every item

needing to find the stock locations and navigate the aisles and rows trying to locate the correct products. Using a combination of location sensors, barcodes, RFID tags, and ERP stock data, it is possible to instruct the driver to the location of the stock items and provide directions of how to

robust IIoT solutions deployed it would enable freight goods to be tracked meter by meter from dispatch to arrival. Advanced telemetric sensors in trucks and RFID tags on goods will allow for accurate and predictive location and condition monitoring. Multiple sensors in freight goods will monitor conditions such as temperature, humidity

is rarely concrete evidence of the specific competitive advantage. More often than not, the IIoT is portrayed as deploying high technology, such as augmented reality, RFID customer tracking with personalized advertising, and similar marketing concepts that would not fit easily with most retailers’ current or even future customers. 29 30 Chapter

clear, and in addition, there are further gains that can be reaped from interactive advertising. This innovative form of advertising works by embedding NFC or RFID tags to products, which provide customers with additional information when they are in close proximity. An example, of this is when a potential customer stops

the appropriate apps loaded determine the location of a customer in a supermarket and spy on he or she is viewing. This is possible via RFID tags on products that have very short range, so their phone will only detect the products directly in front of the customer. The app will

devices can communicate by reflecting part of that signal to other nodes, albeit with a slight change. RFID Another extremely popular wireless technology used in retail, commercial, and industrial IoT is the RFID system. RFID use tags to store electronic information that can be communicated wirelessly via electromagnetic fields. Dependent on the system

, tags can be either passive or active and this will determine the range from which the tag and the RFID reader can operate. For example, some tags will use the energy from the reader’s own interrogating radio wave and simply act as a passive

electromagnetic source. On the other hand, some tags are battery powered and transmit actively and these can be situated hundreds of meters from the reader. RFID technology is used in many industries to identify and track inventory, people, objects, and animals due to the tag’s versatility and ability to be

also used in contactless payment systems using cards or even smartphones to place in close proximity to the RFID reader. However, RFID does not always require such close contact; in some cases even the briefest contact at a distance is all that is required. An example of

this is the timing of sports cars lapping a track. Even at those high speeds, RFID works efficiently and reliably and produces accurate timing. Another advantage of RFID is that the tags do not need line of sight or even need to be visible, so they can be

easily concealed in packaging and products. RFID tags can be read simultaneously by a reader if they are in range, which is a big advantage over barcodes, which are read one at

a time. Hundreds of RFIDs can be read at once. Industry 4.0 Miniaturization has greatly enhanced the use of RFID, as now tags can be microscopic in size. Hitachi has so far produced the smallest miniaturized

RFID tag at 0.05mm x 0.05 mm and these dust-sized tags can hold a 38-digit number on

a 128-bit ROM. NFC Near Field Communication (NFC) evolved from RFID technology and is now a common method of short-range wireless communication use in contactless payment systems. The way that NFC works is that a

being assembled will also have embedded intelligence so that they can be identified and located at all times throughout the manufacturing process. The miniaturization of RFID tags enables products to be intelligent and to know what they are, when they were manufactured, and crucially, what their current state is and the

, more developers are using open APIs to mash up applications. Already, developers are looking into technologies that will be an improvement on the current, GPS, RFID, NFC, and even accelerometer sensors embedded in the standard smartphone. • Delivery of better customer service: Industry 4.0 monitoring and feedback mechanisms rely on the

is that parts and components should be identifiable and smart; for example they should be able to identify themselves and hold important information. By using RFID tags that are embedded within the product or packaging, smart machines will be able to identify the component and read its status information and recognize

be a different version of a brand and requires different coloring or perfume added at a specific stage. If the machine can read an embedded RFID tag on the bottle that identifies its brand variety, the machine can automatically add the correct color and perfume for that particular product. That is

what is more their history and what specific stage of production they must next pass through. Now how do we do this? We can use RFID tags that are so miniaturized that now they can be embedded into a label or use NFC (near frequency contact) such as in card payment

is a bit fragile it requires close proximity to the reader, whereas RFID is astonishingly capable. Take for instance a racing car embedded with an RFID tag and during each lap, an RFID reader counts the number of laps. Incredibly, an RFID reader can count reliably every lap a racing car performs even at

speeds of 200 mph and more. Therefore, RFID tags are perfect for Smart Factory applications where the speed of the production process must not be compromised. So let us see how a Smart

they possible decide on a course of action suitable for each entity. The way to do this is through individual identification and data storage via RFID tags on the products themselves. In this way each product, knows what it is, how old it is, and what the next stage of manufacturing

are not the only smart, intelligent entities on the production line, the product also is smart. For example, the shampoo bottles will be fitted with RFID tags, which identify which brand and variant it is, and the state of its production (its own production history to date), as well as the

barcode technology, 23 Big Data, 26–27 document scanning and verification, 26 forklift, 24–25 Google Glass, 25 multiple sensors, 26 pick-by-paper, 25 RFID, 23–24 SmartLIFT technology, 24–25 temperature and humidity sensors, 24 track and trace, 26 M2M, 3 manufacturers, 10 Oil and Gas industry automated remote

IPv6, 112 IPv6 Subnets, 114 NAT, 111 proximity network, 89 wireless communication technology, 102 bluetooth low energy, 103 IEEE 802.15.4, 102 NFC, 107 RFID, 106 RPL, 108 6LoWPAN, 107 Thread, 107 Wi-Fi backscatter, 105 ZigBee, 103 ZigBee IP, 104 Z-Wave, 105 WSN edge node, 90 functional layers

of service (QoS), 122, 138 249 250 Index support modules and options, 148 vs. REST, 150 WSDL, 148 XML, 148–149 R Radio frequency identification (RFID), 20 Real-time reaction, 132 Reliable transport protocol (RTP), 128 Remote operational vehicles (ROV), 9 Return on investment (ROI), 68

RFID, 22–24, 29 Road map business models digital globalization, 238 digitally modified business, 237 new business, 237 customer experience contact points, 235 customers/users directly,

, 224 GE Brilliant Factory, 223 Industry 4.0, 225 manufacturing and services, 229 manufacturing processes, 218 mobile app, 223 production line diagram, CPS, 219–220 RFID tags, 218 SERP system, 221 Siemens Chengdu, 227 winners and losers, 222 SmartLIFT technology, 24–25 Systems-on-a-chip (SoC), 35 T TensorFlow, 63

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

by Marc Goodman  · 24 Feb 2015  · 677pp  · 206,548 words

Mobile Payments Of course, today’s mobile phones are just at their earliest stages of development, and many new sensors, such as radio-frequency identification (RFID) and near-field communication (NFC), will bring new capabilities to mobile phones, as well as new vulnerabilities. One area in which this will be most

targets of their choosing. Even Disneyland, the “Happiest Place on Earth,” is turning to location-based technologies to track its guests using bracelets called MagicBands, RFID-chip-enabled devices that allow Disney to track its guests throughout its parks. Its goal is to use big data to maximize your stay (and

sensors to speak to the world using a variety of communications protocols and technologies such as Wi-Fi, broadband, GSM, CDMA, Bluetooth, radio-frequency identification (RFID), near-field communication (NFC), ZigBee, Z-Wave, and power lines. They will communicate not only with the broader Internet but with each other, generating unfathomable

may soon become an omnipresent feature in our daily lives, allowing us to track objects with centimeter precision. The first of these IoT enabling technologies, RFID, was patented in 1983 and is a wireless low-energy device that can be embedded into any object to make it “smart,” or able to

interact with RFID readers. RFID tags are printed electronic circuits no thicker than a piece of paper, often come in sticker format, many the size of a dime, and

, constant data exchange and can be read by scanners, some as far as up to one hundred meters away. Even if you are unfamiliar with RFID technology, chances are you have already encountered it in your life, whether it’s the security ID card you use to swipe your way into

your hotel room, your subway pass, or the little box you use to pay for highway tolls, such as E-ZPass. Though the convenience of RFID, considered by many the gateway to the Internet of Things, sounds great, there’s one problem: it’s eminently hackable. There have been dozens of

exploits against RFID technology, whose electronics can be readily hacked, spoofed, and jammed, and there is an active “RFID underground” continually working on improving its offensive techniques. The overwhelming majority of today’s

RFID tags have no effective security, encryption, or privacy protocols in place. These shortcomings have allowed the security hacker Francis Brown to build

his own RFID readers for under $400 that can scan, copy, clone, and steal data from your smart cards. As a result, while you’re standing in line

morning latte at Starbucks, Brown can conduct a “brush pass” attack. As he stands there smiling and perhaps even chatting with you, the concealed portable RFID reader in his backpack can query the office key card you have in your wallet, pocket, or purse and abscond with all the details encoded

in it. So what? Here’s why it matters. Brown can then plug his RFID reader into his computer at home and use it to clone RFID cards all day long. That means he can get into your office, hotel room, or home anytime he likes

. Every Fortune 500 company in America uses RFID in its employees’ badges to control access to its office buildings, and Brown has a 100 percent success rate in cloning the cards. The implications

of this for everything from industrial espionage to common burglary to employee safety are enormous. Relying on insecure RFID identity cards as the primary system we use for security and identity in the workplace means the current system is completely broken. Worse, these cards

. Each of them would need to be replaced—an expensive proposition for a corporation with 100,000 employees. Even if you don’t use an RFID card for work, there’s a good chance you either have it or will soon have it embedded in the credit card sitting in your

wallet. Hackers have been able to break into these as well, using cheap RFID readers available on eBay for just $50, tools that allow an attacker to wirelessly capture a target’s credit card number, expiration date, and security

. Welcome to pocket picking 2.0, where the thieves don’t even need to stick their hands in your pocket anymore. The techniques to hack RFID are easy to emulate, and there are hundreds of instruction sites and videos online telling hackers exactly how. Troubling given that billions of things coming

online will be using RFID as their primary language to speak and interact with the world. RFID chips can also be infected with viruses, and just like GPS signals RFID can be jammed, preventing you from getting into your office and allowing thieves

to shoplift expensive goods electronically tagged by retailers. Another popular IoT communications technology is RFID’s younger brother, known as near-field communication (NFC) and currently built into 20 percent of mobile phones, particularly Android models, as well as the

to pay for a product, and the funds will be deducted from your phone’s virtual wallet or charged to your credit card. But like RFID, NFC has been compromised on many occasions, with hacker apps such as NFCProxy capable of copying NFC credit card data in real time and replaying

operators, equating to free subway rides for life. Another IoT wireless communications technology that has surged in its usage and popularity is Bluetooth, but like RFID and NFC it too is easily subverted. There are dozens of easy-to-use free apps and programs such as Blue Scanner, Blue Bugger, BT

entertainment system is in your car, its thermostat regulates the temperature in your home, and its smart watch monitors your physical activity? Not only will RFID and other IoT communications technologies track inanimate objects, but they will be used for tracking living things as well. Many pet lovers are already familiar

with companies such as PetLink, HomeAgain, and AKC Reunite, which provide implantable RFID chips to veterinarians so that lost dogs and cats can be identified and returned to their homes if they run away. What may be less

well known, however, is that increasingly human beings too are forcibly monitored via RFID wristband systems, such as those becoming commonplace in jails and prisons from Los Angeles to Washington, D.C. In some countries, such as the U

.K., government officials are even considering implanting RFID chips directly under the skin of prisoners, just as is common practice with dogs. While many might not object to convicted criminals being subjected to

, they may feel differently when similar techniques are applied to their own children. School officials across the United States have begun embedding RFID chips in student identity cards, which pupils are required to wear on their persons at all times. In Contra Costa County, California, preschoolers are now

jerseys with electronic tracking devices built in that allow teachers and administrators to know exactly where each student is. According to school district officials, the RFID system saves “3,000 labor hours a year in tracking and processing students.” Of course, when people are forced to join the Internet of Things

, a wide variety of other privacy and public policy issues arise. For example, the same RFID system that enables constant student monitoring will be able to identify those students who move around “too much” and therefore may be deemed hyperactive, disruptive

tracked are being told “tough luck,” and in 2013 the sophomore Andrea Hernandez in San Antonio, Texas, was suspended when she refused to wear her RFID device on campus. Meanwhile, the ability to track employees, how much time they take for lunch, length of their bathroom breaks, and the number of

onboard diagnostics ports, which provide direct physical access to a vehicle’s central computer systems, and a cluster of new IoT communications protocols such as RFID, Bluetooth, and mobile telephony provide such access at a distance. Newer vehicles even come with USB ports, and as always more connections mean more vulnerabilities

subverted, and at least one, the Karotz plastic interactive bunny, which can be controlled by a smart-phone app and includes a camera, microphone, and RFID chip, has been hacked, allowing an attacker to conduct video surveillance on your kid. Other technologies, including the 135-year-old lightbulb, are getting their

those in Manhattan, elevators do not even have individual numbered buttons for you to select your desired floor anymore. Instead, the data encoded in your RFID badge or the controls at a central security station predetermine to what floors the elevator will take you. Just like your home automation hub, commercial

its own therapeutic purpose within the body, IMDs communicate with the outside world via familiar radio-frequency protocols such as Bluetooth, Wi-Fi, NFC, and RFID. Millions of Americans have been equipped with IMDs, and approximately 300,000 patients receive wireless implantable medical devices annually. The devices have become pervasive in

well be even more so in the future. Already Motorola has partnered with the firm MC10 to “extend human capabilities through virtually invisible wearable electronic RFID tattoos” that can be used for password authentication. Proteus Digital Health has created a pill that you can swallow and is powered by the acid

, and it’s not the one most think of. It is the problem of technical literacy. In a world replete with gadgets, algorithms, computers, wearables, RFID chips, and smart phones, only a minute portion of the general population has any idea how these objects actually work. Whether it’s Crime, Inc

Interest, Internet of Things Initiative, Oct. 8, 2011, 48. 24 There have been dozens: Annalee Newitz, “The RFID Hacking Underground,” Wired, May 2006. 25 These shortcomings have allowed: Francis Brown and Bishop Fox, “RFID Hacking” (paper presented at Black Hat USA, Las Vegas, Nev., Aug. 1, 2013). 26 Every Fortune 500 company

Greenberg, “Hacker’s Demo Shows How Easily Credit Cards Can Be Read Through Clothes and Wallets,” Forbes, Jan. 30, 2012. 28 RFID chips can also be infected: Nate Anderson, “RFID Chips Can Carry Viruses,” Ars Technica, March 15, 2006. 29 Another popular: Juniper Research, “1 in 5 Smartphones will have NFC by

2014, Spurred by Recent Breakthroughs: New Juniper Research Report,” April 14, 2011. 30 But like RFID: Andy Greenberg, “Hacker Demos Android App That Can Wirelessly Steal and Use Credit Cards’ Data,” Forbes, July 27, 2012. 31 Google Wallet has also been

Brother Invades Our Classrooms,” Salon, Oct. 8, 2012. 40 “Students who do not wish”: David Kravets, “Student Suspended for Refusing to Wear a School-Issued RFID Tracker,” Wired, Nov. 21, 2012. 41 Based on nothing more: Aaron Katersky and Josh Haskell, “NY Mom Accused of Growing $3M Marijuana Business,” Good Morning

Everyware: The Dawning Age of Ubiquitous Computing

by Adam Greenfield  · 14 Sep 2006  · 229pp  · 68,426 words

used by the marketers of technology to connote trendiness; not a day goes by without the appearance of some relevant news item. We hear about RFID tags being integrated into employee ID cards, a new modular sensor grid on the architectural market, a networking scheme proposing to use the body's

to suit our older prerogatives of personal agency, civil liberty, and simple sanity. 4. I'm afraid that readers looking for a technical explanation of RFID tag readers, gestural interfaces, or operating systems capable of juggling the multiple, distributed events of ubiquitous environments will be sorely disappointed in this book. My

users than did the traditional "event queue." Developments elsewhere in the broader information technology field had clear implications for the ubiquitous model. Radio-frequency identification (RFID) tags and two-dimensional barcodes were just two of many technologies adapted from their original applications, pressed into service in ubicomp scenarios as bridges between

'll see, some designers are exploring how the possibilities inherent in an everyday object can be thoroughly transformed by the application of information technologies like RFID, Global Positioning System (GPS), and mesh networking. The idea of incorporating digital "intelligence" into objects with an everyday form factor—industrial-designer jargon for an

reimagined as everyware? One, relatively crude and timid, expression might propose that, instead of the inert slips of paper we now proffer, we hand out RFID-equipped "smart" cards encoding our contact information and preferences. (Maybe you'd tap such a card against a reader to place a call, without having

Weiser may have been thinking when he talked about "disappearance." If that's too abstract for you, let's take a look at MasterCard's RFID-equipped PayPass contactless payment system, which will have been introduced commercially (alongside Chase's competing Blink) by the time this book is published. MasterCard's

with visual behaviors. Each DataTile, a transparent pane of acrylic about 10 centimeters on a side, is actually a modular interface element with an embedded RFID tag. Place it on the display and its behaviors change depending on what other tiles it has been associated with. Some are relatively straightforward applications

reasonably straightforward to arcane and highly computationally intensive attempts to infer the meaning of user gestures from video. Some of the more practical rely on RFID-instrumented gloves or jewelry to capture gesture; others depend on the body's own inherent capacitance. Startup Tactiva even offers PC users something called TactaPad

recent pilot program InClass aimed to cut down on teacher administrative time by doing just this, producing a tally of classroom attendance as students wearing RFID-equipped nametags passed beneath a transom-mounted reader.* * Parents objected to the program on privacy concerns, and the system was withdrawn from operation after less

, signage, even manhole covers can provide the urban sojourner with smart waypoints; Tokyo's Shinjuku ward is currently tagging some 10,000 lamp posts with RFID panels that give visitors information on nearby public toilets, subway entrances, and other accommodations. Meanwhile, maps themselves can offer dynamic, real-time information on position

simple expedience, by social convention, by exhaustion, by force of regulation or law to accept such an exposure. I don't want to wear an RFID nametag, but my job requires me to. I'd rather not have my precise weight be a matter of public record, but the only way

under the condition of ambient informatics. As it happens, many of these quantities are already easily recoverable, even without positing sensors in the sewers and RFID tags on every bag and pallet. They exist, right now, as numeric values in a spreadsheet or a database somewhere. All that is necessary to

from the alphabet soup of new standards and specifications we face at the moment and take a look at what they seem to "want." First, RFID, the tiny radio-frequency transponders that are already doing so much to revolutionize logistics. The fundamental characteristic of an

RFID tag is cheapness—as of mid-2004, the unit production cost of a standard-issue passive tag stood at about fifty cents, but industry sources

, sorting, and self-identification of items they're appended to, and much more besides—there are likely to be few persuasive arguments against doing so. RFID "wants" to be everywhere and part of everything. In networking, the next step beyond the Wi-Fi and Bluetooth standards we're familiar with is

broad application for use with children, the disabled, or other groups for whom simply navigating the world is a considerable challenge—for example, a wearable, RFID-based system recently described in the Japanese Mainichi Shimbun that automatically turns crossing signals green for elderly citizens, holding oncoming traffic until they have crossed

picture. At the most basic level, it would be difficult to imagine a technology more suited to monitoring a population than one sutured together from RFID, GPS, networked biometric and other sensors, and relational databases; I'd even argue that everyware redefines not merely computing but surveillance as well.* * A recent

was called into being by the Internet, or a Universal Product Code, which cannot be separated from the technics of bar-coding and its descendent, RFID. And though such conventions may be intangible, they nevertheless have power, in our minds and in the world. The existence of a machine-readable format

that appear to inhere in technologies even at the very moment that they come into being, there is always human agency involved—always. So if RFID "wants" to be everywhere and part of everything, if IPv6 "wants" to transform everything in the world into a node, we should remember to ask

inscribing some set of values in the world. Imagine that a large American company—say, an automobile manufacturer—adopts a requirement that its employees carry RFID-tagged personal identification. After a lengthy acquisition process, the company selects a vendor to provide the ID cards and their associated paraphernalia—card encoders and

systems, especially when interconnected, often have little to do with anything the makers imagined.* * As security expert Bruce Schneier says, "I think [a vendor of RFID security systems] understands this, and is encouraging use of its card everywhere: at sports arenas, power plants, even office buildings. This is just the sort

, on finer-grained problems: calibrating the sensitivity of a household sensor grid so that it recognizes human occupants but not the cat, or designing an RFID-equipped key fob so that it reads properly no matter which of its surfaces is brought into range of the reader. With such a tight

their phones. Given the facts on the ground, Japanese developers wisely decided to concentrate on the ubiquitous delivery of services via keitai—for example, the RFID-tagged streetlamps of Shinjuku already discussed, or the QR codes we'll be getting to shortly. And as both phones themselves and the array of

useful work unthreatened by the emergence of the PC, the advent of ubiquitous computing will not mean the disappearance of earlier forms. Wearables, embedded sensors, RFID-based infrastructures of one sort or another, and the many other systems that we've here defined as ubiquitous in nature can—in fact already

for one or another system's failure to observe the relevant convention; The Octopus smartcard scheme we'll be discussing, for example, uses an idiosyncratic RFID architecture that does not conform to the ISO 14443 standard, simply because it was first deployed before the standard itself was established. In other cases

exist, compliance with them is still subject to the usual vagaries—a process that can be seen, in microcosm, in the market for pet-identification RFID transponders. The United Kingdom mandates that all pet transponders and veterinary readers sold conform to the ISO FDXB standard. A single countrywide registry called PetLog

scanner manufacturer, but not others. Should your pet wander into the next town over and get taken to a vet or a pound using an RFID system from a different vendor, the odds of its being properly identified are slim indeed. In this case, as in so many others, it's

exist—and are in fact already widely deployed. We'll limit our discussion here to the two most prominent such technologies: RFID tags and two-dimensional bar-codes. The acronym RFID simply means "radio-frequency identification," although in use it has come to connote a whole approach to low-cost, low-impact

data-collection. There are two fundamental types of RFID tags, "active" and "passive"; just as you'd assume, active tags broadcast while passive tags require scanning before offering up their payload of information. While

of stickers. Of course, this limits their range of action to short distances, no more than a few meters at the very outside, while active RFID units, supplied with their own onboard transmitter and power supply, trade greater range for a correspondingly bulkier profile. The onboard memory chip generally encodes a

, color.... Really, the possibilities are endless. And it's this flexibility that accounts for the incredibly wide range of RFID applications we see: In everyday life, you're almost certainly already engaging RFID infrastructures, whether you're aware of it or (more likely) not. Two-dimensional bar codes address some of the

same purposes as passive RFID tags, though they require visual scanning (by a laser reader or compatible camera) to return data. While unidimensional bar-codes have seen ubiquitous public use

, where you can learn, among other things, precisely how much corned beef the deli serves each week.* * Five thousand pounds. The significance of technologies like RFID and 2D bar-coding is that they offer a low-impact way to "import" physical objects into the data-sphere, to endow them with an

picked, how it was shipped, who sold it to you, and when it'll need to be used by (or thrown out). This avocado, that RFID-tagged pallet—each is now relational, searchable, available to any suitable purpose or application a robust everyware can devise for it. And of course, if

you're interested in literal ubiquity or anything close to it, it surely doesn't hurt that RFID tags and 2D codes are so very cheap. Richly provisioned with such bridges between the respective worlds of things and of data, there is no

somewhere in the gap between theory and robust praxis. Exactly how is a piece of information represented so that it may be reported by an RFID tag, put into proper perspective by visualization software, correlated with others in a database, and acted on by some remote process? How do such heterogeneous

document describing this book might mark it up (at least in part) like this: * Such tags are not to be confused with those of the RFID variety. <title>Everyware</title> <subtitle>The dawning age of ubiquitous computing</subtitle> <author>Adam Greenfield</author> <pubyear>2006</pubyear> Once a document has been marked

objects, dissolving in behavior—can already be found in systems used by millions of people each day. We've already discussed PayPass and Blink, the RFID-based payment systems that will receive their large-scale commercial rollouts by the end of 2005. What if they succeed beyond their sponsors' expectations and

, ideal for a place as phone-happy as Hong Kong.* * Despite the popular "Octo-phone" moniker, Nokia made the canny decision to embed the Octopus RFID unit not in any one model of phone, but in an interchangeable faceplate. If this description sounds a little breathless, it's because I have

E-ZPass electronic toll-collection system, now used on highways, bridges and tunnels throughout the Northeast Corridor. E-ZPass, like California's FasTrak, is an RFID-based system that lets subscribers sail through toll plazas without stopping: A reader built into the express-lane infrastructure queries dashboard- or windshield-mounted tags

everyware to lend the notion commercial credibility. Of course, New Songdo's planners present it to the world as more than just smart floors and RFID-scanning trash cans. It's being promoted as a 21st century trade portal, an English-speaking "Free Economic Zone" richly supplied with multimodal transportation links

realistic alternatives must exist. If you still want to use an "old-fashioned" key to get into your house, and not have to have an RFID tag subcutaneously implanted in the fleshy part of your hand, well, you should be able to do that. If you want to pay cash for

our rights for us, from Dunne & Raby's protective art objects to the (notional) RFIDwasher, a keyfob-sized device that enables its users "to locate RFID tags and destroy them forever!" Some will argue that such material strategies are more efficient, more practical, or more likely to succeed than any assertion

phones, mobile photo-sharing services physical computing privacy issues See also surveillance processors product identifiers public space R radio-frequency identification. See RFID relationality remote controls (motes) remote systems RFID tags RFID technology. See also payment systems rooms. See indoor environment S screens computer display everyware and resolution wall seamlessness security. See also

Engineering Security

by Peter Gutmann

. [215] “The Usability of Electronic Voting Machines and How Votes Can Be Changed Without Detection”, PhD thesis, Sarah Everett, May 2007. [216] “Why Biometrics and RFID are not a Panacea: A Comedy of Errors in three Acts”, Peter Gutmann, 2008, http://www.cs.auckland.ac.nz/~pgut001/pubs/biometrics.pdf. [217

acts on the data before you verify its integrity. This is exactly what happened with e-passports, for which implementations would read information from the RFID chip in the passport, parse the data structures, decode the payload, and only then verify whether the data that they’d just processed was authentic

medical practice saving lives is more important than fiddling with computer access control mechanisms. One way of dealing with this issue would be to use RFID tags embedded in staff ID cards to automatically authenticate users to equipment as they approach it, so that the authentication follows the user (with obvious

]. Location-limited channels have been proposed as a means of repairing the security holes introduced by making smart cards remotely readable in the form of RFID tokens, which remove the explicit authorisation-to-read and write that’s normally provided by inserting the card into a reader. These methods include allowing

[325]. Zero-power authentication works by harvesting its power from the radio-frequency signals transmitted by the sender (this is the standard way of powering RFID tags), making the attacker carry the cost of the attack and not even waking up the actual device until the authentication has been successfully completed

ever being aware that their passport is being misused in this manner. It doesn’t even require specialised equipment but can be done with standard RFID-enabled cellphones [421]. Although there exist theoretical defences against this in the form of specialised distance-bounding protocols (discussed earlier in this section) designed for

RFID use, in practice implementation issues and problems due to excessive false positives has left these protocols mostly as a lab curiosity. The same types of

relay attacks are possible with RFID-enabled credit cards [422][423][420], access control systems [424], keyless car entry systems [425], and a number of other systems employing contactless interfaces that

change in interface type. It’s even possible to buy off-the-shelf relay-attack devices for some types of RFID transponders under various euphemisms like “signal boosters” and “range extenders”. RFID-based payment systems implemented in cellphones make this even worse, since a phone-based relay attack is now indistinguishable from

Pignataro, October 2007. [323] “DTCP Volume 1 Supplement E Mapping DTCP to IP (Informational Version)”, Digital Transmission Licensing Administrator, 19 March 2010. [324] “Project Tackles RFID Security”, Linda Paulson, IEEE Computer, Vol.43, No.7 (July 2010), p.19. [325] “The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of

and Walid Bagga, Security and Privacy in the Age of Ubiquitous Computing, IFIP Advances in Information and Communication Technology, Vol.181, 2005, p.223. “An RFID Distance Bounding Protocol”, Gerhard Hancke and Markus Kuhn, Proceedings of the 1st Conference on Security and Privacy in Communications Networks (SecureComm’05), September 2005, p

Ersin Uzun, Proceedings of the 11th Information Security Conference (ISC’08), Springer-Verlag LNCS No.5222, September 2008, p.385. “Distance Bounding Protocol for Multiple RFID Tag Authentication”, Gaurav Kapoor, Wei Zhou and Selwyn Piramuthu, Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC’08), December 2008, p.115

. “The Swiss-Knife RFID Distance Bounding Protocol”, Chong Kim, Gildas Avoine, François Koeune, François-Xavier Standaert and Olivier Pereira, Proceedings of the 11th International Conference on Information Security and

] [360] [361] [362] [363] [364] [365] [366] [367] 523 Cryptology (ICISC’08), Springer-Verlag LNCS No.5461, December 2008, p.98. “An Efficient Distance Bounding RFID Authentication Protocol Balancing False-Acceptance Rate and Memory Requirement”, Gildas Avoine and Aslan Tchamkerten, Proceedings of the 12th Information Security Conference (ISC’09), Springer-Verlag

Communication”, J. Wittwer, F. Kirsch and M. Vossiek, Proceedings of the Conference on Microwaves, Communications, Antennas and Electronic Systems (COMCAS’09), November 2009, p.1. “RFID Distance Bounding Multistate Enhancement”, Gildas Avoine, Christian Floerkemeier and Benjamin Martin, Proceedings of the 10th International Conference on Cryptology in India (Indocrypt’09), Springer-Verlag

LNCS No.5922, December 2009, p.290. “RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks”, Chong Kim and Gildas Avoine, Proceedings of the 8th International Conference on Cryptology And Network

Boudec, Proceedings of the 3rd Conference on Wireless Network Security (WiSec’10), March 2010, p.117. “Cryptographic Puzzles and Distance-bounding Protocols: Practical Tools for RFID Security” Pedro Peris-Lopez, Julio Hernandez-Castro, Juan Tapiador, Esther Palomar and Jan van der Lubbe, IEEE Communications Letters, Vol.14, No.2, (April 2010

), p.121. “Design of a Secure Distance-Bounding Channel for RFID”, Gerhard Hancke, Journal of Network and Computer Applications, Vol.34, No.3 (May 2010), p.877. “Optimal Security Limits of

RFID Distance Bounding Protocols” Orhun Kara, Süleyman Kardaş, Muhammed Bingöl and Gildas Avoine, Proceedings of the 6th Workshop on RFID Security (RFIDSec’10), Springer-Verlag LNCS No.6370, June 2010, p.220. “The Poulidor Distance-Bounding

Protocol”, Rolando Rasua, Benjamin Martin and Gildas Avoine, Proceedings of the 6th Workshop on RFID Security (RFIDSec’10), Springer-Verlag LNCS No.6370, June 2010, p.239. “Realization of RF Distance Bounding”, Kasper Rasmussen and Srdjan Čapkun, Proceedings of the

19th Usenix Security Symposium (Security’10), August 2010, p.389. “Non-Uniform Stepping Approach to RFID Distance Bounding Problem”, Ali Gürel, Atakan Arslan, and Mete Akgün, Proceedings of the 5th International Workshop on Data Privacy Management (DPM’10), Springer-Verlag LNCS

Chen and Prasant Mohapatra, Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS’11), February 2011, to appear. “A Framework for Analyzing RFID Distance Bounding Protocols”, Gildas Avoine, Muhammed Bingöl, Süleyman Kardas, Cédric Lauradoux and 524 Usability [368] [369] [370] [371] [372] [373] [374] [375] [376] [377] [378

, Hu Xiong, Yonggang Wang, Huiping Sun, Zhi Guan and Zhong Chen, Proceedings of the Asia Workshop on RFID Security (RFIDSec’11 Asia), April 2011, p.129. “Design of a Secure Distance-Bounding Channel for RFID”, Gerhard Hancke, Journal of Network and Computer Applications, Vol.34, No.3 (May 2011), p.877. “A

Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions”, Süleyman Kardaş, Mehmet Kiraz, Muhammed Bingöl, and Hüseyin Demirci

, Proceedings of the 7th Workshop on RFID Security (RFIDSec’11), Springer-Verlag LNCS No.7055, June 2011, p.78. “A

secure distance-based RFID identification protocol with an off-line backend database”, Pedro Peris-Lopez, Agustin Orfila, Esther Palomar and Julio

devices”, Claude Castelluccia and Pars Mutaf, Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services (MobiSys’05), June 2005, p.51. [409] “RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorised Reads with Context-Aware Communications”, Alexei Czeskis, Joshua Smith, Karl Koscher and Tadayoshi Kohno

Juels, David Molnar and David Wagner, Proceedings of the 1st Conference on Security and Privacy in Communications Networks (SecureComm’05), September 2005, p.74. [418] “RFID Insecurity for Entity Authentication”, Abbas Alfaraj, University College London Master’s Thesis, 2006. [419] “A Note on the Relay Attacks on e-passports: The Case

e-passports”, Martin Hlaváč and Tomas Rosa, Cryptology ePrint Archive, Report 2007/244, June 2007, http://eprint.iacr.org/2007/244. [420] “Why Biometrics and RFID are not a Panacea Introduction to Biometrics”, Peter Gutmann, 2010, http://www.cs.auckland.ac.nz/~pgut001/pubs/biometrics.pdf. [421] “Mobile Apps and

RFID — The Tale Of Two Techs”, Nick von Dadelszen, presentation at Kiwicon V, November 2011. [422] “Picking Virtual Pockets using Relay Attacks on Contactless Smartcard”, Ziv

1st Conference on Security and References [423] [424] [425] [426] 527 Privacy in Communications Networks (SecureComm’05), September 2005, p.47. “Vulnerabilities in First-Generation RFID-enabled Credit Cards”, Thomas Heydt-Benjamin, Daniel Bailey, Kevin Fu, Ari Juels and Tom O’Hare, Proceedings of the 11th Financial Cryptography and Data Security

Pathak, Nirav Shah and Isaac Woungang, Telecommunication Systems, Vol.44, No.3-4 (August 2010), p.281. “Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems”, Rishab Nithyanand, Gene Tsudik and Ersin Uzun, Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS’10), Springer-Verlag LNCS No

The Silent Intelligence: The Internet of Things

by Daniel Kellmereit and Daniel Obodovski  · 19 Sep 2013  · 138pp  · 40,787 words

emergency. Smart electric meters help consumers save on energy costs, while enabling the utility companies to optimize network load and avoid blackouts. Radio Frequency Identification (RFID) tags help us talk to the things around us, such as garments on the shelf of a store, to determine what’s in stock and

fabric of everyday life until they are indistinguishable from it.”5 The article laid the foundation for many subsequent visions, resulting in the development of RFID, smartphones, and M2M solutions. Glen Allmendinger, founder and president of Harbor Research, which arguably has done the most work analyzing the space, started working on

others in April 1999. The purpose of the Auto-ID Center (currently MIT Auto-ID Labs) was to develop the Electronic Product Code — a global RFID-based identification system. Sanjay Sarma describes the vision for Auto-ID: My colleague David Brock made the following interesting observation: Imagine you have Rosie the

the time were considered a quasi-automatic data capture, but they are not automatic at all. Barcodes are data-capture technology for humans, while RFID is a capture technology for computers. RFID is a way to hack the real world. As things get wirelessly connected, Sanjay Sarma believes in the proliferation of

RFID. He thinks RFID readers will become ubiquitous. The economic downturn of 2001 only temporarily slowed the unstoppable development of the Internet of Things. As a matter of fact,

sent to the network. Examples are body sensors that measure pulse or calorie consumption, automotive OBD-II14 devices that measure car acceleration, and many others. RFID tags and readers belong to this category as well. To transmit data, devices are equipped with a radio transmitter, which can be cellular, Wi-Fi

this book we are going to primarily talk about wireless networks such as cellular, satellite, Wi-Fi for wide-range communication, and Bluetooth, ZigBee, and RFID for short-range communication. Cellular networks are playing an increasingly important role in the M2M space, because the cost of mobile data is continually going

that get installed in cars, elegant body-worn fitness devices, connectivity modules that get embedded in home appliances, moisture sensors that go in the soil, RFID readers, and so on. All require different form factors, different types of connectivity, and different applications. Here’s what Steve Pazol has to say about

M2M space. When deciding on which networks to run an M2M solution, we would like to point out the ubiquity versus granularity problem. For example, RFID tags are very low cost, don’t need a battery, and have an infinite life. One can put an

RFID tag on almost anything — for instance, every item in a grocery store. That way, RFID provides a high level of granularity for seeing and detecting things. However, for each RFID installation there needs to be RFID readers, which require installation, calibration, and fine-tuning

. The RFID does not provide the ubiquity of other networks. Let’s take

cellular: Mobile carriers provide access to cellular networks almost everywhere — cellular networks are ubiquitous. However, the cellular devices are costly compared to the RFID tags, they are bulky, and they require batteries to run. Cellular devices do not offer the same level of granularity that

RFID provides. To better understand this problem, we spoke with Professor Sanjay Sarma of MIT. Sanjay pointed out that the biggest cost in RFID today is in installation and integration. One way to address the issue of ubiquity

, he says, would be to wirelessly enable RFID readers with 4G or Wi-Fi and make them ubiquitous. Sanjay says, “Imagine if the reader comes with a standard electric plug, all you need

in and you’re good to go.” He envisions the time when so many devices are going to have RFID-reader capability that it will solve the problem of the short range of RFID devices — there will always be a reader in range. On the other side, mobile carriers are just starting

analyze the information from multiple sources to give us a better picture, we will see the emergence of total asset management, for example, by combining RFID, RTLS (real-time location systems), cellular, and satellite communication: If I load a box of high-value pharmaceuticals, equipped with

RFID, onto a container, which in turn is put on a train, which is later put on a boat, I can potentially track the pharmaceuticals in

interesting vision of using the cloud model to minimize compromises in software and service development: For example, RFID tells the software system in logistics to move certain pallets onto that certain truck. The vision of RFID is that the world is talking back. As if to say, for example, “Hey, sorry, the

the broker. According to Kevin Ashton, dealing with the identity of things was the main reason for developing the Internet of Things vision and the RFID standards. Having universal code, which would enable objects in the physical world to report on what they are and what they do in a unified

way, was the absolutely essential thing. The same concept needs to populate the world of the Internet of Things outside of RFID, like sensors and devices, which is expanding very rapidly. Also, considering that very soon the amount of data on the Internet produced by machines will

will be significantly affected by the Internet of Things. The first is hospital and clinical processes. From tracking hospital assets and patients with RTLS and RFID, to replacing bulky wired body sensors with unobtrusive wireless ones, to remotely monitoring hospital equipment, the world of health care is in for some dramatic

fraction of the money it saves the hospital. This is a successful use case. The technology that supports this use case consists of an active RFID tag attached to every asset, which communicates its position to access points installed throughout the hospital. The data from the tags is sent over the

reality. Here are a few examples that show what is possible today. Imagine analyzing millions of data sets for a retailer that has implemented an RFID-based process to track millions of items. This was not possible a couple of years ago, but due to reduced costs in producing these tags

The Best of 2600: A Hacker Odyssey

by Emmanuel Goldstein  · 28 Jul 2008  · 889pp  · 433,897 words

of Kismet, the most powerful and versatile program designed to find and interpret wireless data signals. But of course, wireless technology also encompasses cellular phones, RFID, satellite technology, and even pirate radio. There are so many interesting things going through the airwaves at any given time in any part of the

cellular provider if and when you try all of this. That said, have fun and I hope you learned something! RFID: Radio Freak-Me-Out Identification (Spring, 2007) By Kn1ghtl0rd RFID has become something of a hot topic in the hacking world. There have been multiple presentations on security and privacy of

RFID and also the technology behind it. This article is designed to be a what-if type scenario on what RFID is potentially capable of and

where the technology is heading. RFID stands for Radio Frequency Identification, which obviously means identifying objects using radio frequency. Current implementations include asset management, inventory control, inventory tracking

another or to monitor asset activity to isolate theft situations and problem areas. These implementations of RFID are very efficient and perform a valuable task for a business. The fourth example is not so good. RFID is being changed into a new type of ID for people and animals to be used

this technology to turn our world upside down and allow for Big Brother to truly manifest itself. Currently a human being can receive an implanted RFID chip that stores an identification number that associates them with information in a database. This can be anything from personal data such as name, address

be controlled by someone. More than likely that someone will be the government. This may not seem so scary either. But wait, there is more. RFID in its current implementations has been proven to be a reliable solution for tracking inventory. Change the word inventory to humans and you see the

far of a stretch to see product marketing analysis based on human purchase activity that is all based on RFID technology. Picture walking into Wal-Mart and having the racks scan your RFID tags and create some kind of notice to you to point on items that you prefer based on past

13 shoes in stock. Now take it one step further and say you purchase one of those pairs of shoes. The shoes themselves have an RFID tag imbedded in them so now not only can we see where you are going based on the implanted

RFID tag, but we can also see that you bought your shoes from Wal-Mart and produce Wal-Mart advertising on interactive billboards as you pass

overview of, 361–362 pager, 101–102, 340, 342–343 pirating airwaves, 758–761 94192bindex.qxd 6/3/08 3:29 PM Page 861 Index RFID (Radio Frequency Identification) and, 749–751 trunking communications monitoring, 362–364 XM Radio, 753–758 Radio Common Carrier (RCC), 87 Radio Frequency Identification

(RFID), 749–751 radio modem, electronic message centers, 769–770 Radio Shack fixing PRO-2004 scanner, 100–101 hacking into, 704–706 raids, 1980s conclusions, 205–

, credit card fraud, 708–709 on vacation, 722–725 Wal-Mart, 711–714 retinal scans, biometrics, 810 Return*Call, 461 RFC822 mail addresses, 152–155 RFID (Radio Frequency Identification), 749–751 RFM (Reduced-Fare MetroCard), 785, 788–789 RHS (Right Hand Side), RFC822 mail addresses, 153–155 RIAA (Recording Industry Association

MTA. see New York’s MTA overview of, 732 pirate radio primer, 758–761 real electronic brain implantation enhancement, 824–828 remote secrets, 773–777 RFID, 749–751 satellite TV broadcasts, 761–765 social engineering and pretexts, 828–830 WAP, 747–749 WiFi and MITM, 744–746 XM Radio, 753–758

:29 PM Page 871 Index guide to 802.11b networks, 733–739 hacking Captivate network, 743–744 overview of, 732 pirate radio primer, 758–761 RFID, 749–751 satellite TV broadcasts, 761–765 WAP, 747–749 WiFi and MITM, 744–746 XM Radio, 753–758 wires, worn for surveillance, 352–353

Data Mining: Concepts and Techniques: Concepts and Techniques

by Jiawei Han, Micheline Kamber and Jian Pei  · 21 Jun 2011

work out a fast route. 4.11 Radio-frequency identification is commonly used to trace object movement and perform inventory control. An RFID reader can successfully read an RFID tag from a limited distance at any scheduled time. Suppose a company wants to design a data warehouse to facilitate the analysis of

objects with RFID tags in an online analytical processing manner. The company registers huge amounts of RFID data in the format of (RFID, at_location, time), and also has some information about the objects carrying the

RFID tag, for example, (RFID, product_name, product_category, producer, date_produced, price). (a) Design a data warehouse to facilitate effective registration

and online analytical processing of such data. (b) The RFID data may contain lots of redundant information. Discuss a method that

maximally reduces redundancy during data registration in the RFID data warehouse. (c) The RFID data may contain lots of noise such as missing registration and misread IDs. Discuss

a method that effectively cleans up the noisy data in the RFID data warehouse. (d) You may want to perform online analytical processing to determine how many TV sets were shipped from the LA seaport to BestBuy

in Champaign, IL, by month, brand, and price_range. Outline how this could be done efficiently if you were to store such RFID data in the warehouse. (e) If a customer returns a jug of milk and complains that is has spoiled before its expiration date, discuss how

implementation of geospatial data warehouses, and multimedia data cubes for the multidimensional analysis of multimedia data (those containing images and videos). RFID data cubes handle the compression and multidimensional analysis of RFID (i.e., radio-frequency identification) data. Text cubes and topic cubes were developed for the application of vector-space models

, Ding, Han, et al. [LDH+08] and TopicCube, based on a topic modeling approach, was proposed by Zhang, Zhai, and Han [ZZH09]. RFID Cube and FlowCube for analyzing RFID data were proposed by Gonzalez, Han, Li, et al. [GHLK06] and [GHL06]. The sampling cube was introduced for analyzing sampling data by Li

has far-reaching implications, given the popularity of mobile phones, GPS devices, Internet-based map services, weather services, and digital Earth, as well as satellite, RFID, sensor, wireless, and video technologies. Among many kinds of spatiotemporal data, moving-object data (i.e., data about moving objects) are especially important. For example

ACM-SIGMOD Int. Conf. Management of Data (SIGMOD’99) Philadelphia, PA. (June 1999), pp. 169–180. [GHL06] Gonzalez, H.; Han, J.; Li, X., Flowcube: Constructuing RFID flowcubes for multi-dimensional analysis of commodity flows, In: Proc. 2006 Int. Conf. Very Large Data Bases (VLDB’06) Seoul, Korea. (Sept. 2006), pp. 834

–845. [GHLK06] Gonzalez, H.; Han, J.; Li, X.; Klabjan, D., Warehousing and analysis of massive RFID data sets, In: Proc. 2006 Int. Conf. Data Engineering (ICDE’06) Atlanta, GA. (Apr. 2006), p. 83. [GKK+01] Grossman, R.L.; Kamath, C.; Kegelmeyer

The Long History of the Future: Why Tomorrow's Technology Still Isn't Here

by Nicole Kobie  · 3 Jul 2024  · 348pp  · 119,358 words

it was considered as a means to control cars. The advent of virtual reality happened before we nailed computer graphics. The first radio frequency identification (RFID) sensor installed in a human wasn’t a chip but a breakable glass vial. We never stop being impressed by modern technology, and can never

ways. Some amputees and those born without limbs sport smart prosthetics. But not all cyborg tech is so useful: thousands of people have had an RFID chip – the basic technology that lets you wave a credit card to pay for something – inserted under their skin to avoid carrying a card in

a missing sense, but adding or improving one – which shifts us into the world of cyborgs. So far, the most common additions are the aforementioned RFID chips placed under the skin to unlock doors or pay at the till without reaching into your pocket, though there’s also sense-hacking, such

considered a cyborg. Instead, let’s restrain our definition to include humans with smart technology implanted or otherwise meshed with the body, be it an RFID payment chip, nerve-controlled prosthetic or brain implant. People sporting such technology may not personally identify as cyborgs, but the technology that assists them is

scientist, you are a science fiction writer because it’s not been done until you do it.’ The first implant Warwick tried was a simple RFID transmitter, just 2cm (¾in) long and housed in glass – he shattered the first one trying to sterilise it through boiling. ‘I dropped one on the

after the other. ‘One was saying you really shouldn’t have done this,’ he says. ‘The other was saying congratulations, well done.’ Once there, the RFID transmitter meant Warwick’s approach could open a door and trigger it to say a welcoming message, turn on a light and load his webpage

certainly a neat trick. However, none of these showpieces worked four days before the press launch. A bug meant the chosen code emitted from the RFID transmitter – 666, owing to a lab technician’s devilish sense of humour – was failing to pick up. But other codes did, spookily enough, and after

hard graft by the team, everything worked by the time the media arrived for Warwick’s performance. The RFID transmitter was basic – he could have simply carried it in his hand to achieve the same effect – and that experiment didn’t scratch the itch

for Warwick. Nine days later, the RFID tube was removed, and for his second go at being a cyborg, the team decided to install a mini array of microelectrodes into the median

British tech website The Register, which called Warwick ‘Captain Cyborg’ and a ‘media strumpet’. And while it’s true the project was limited – especially the RFID chip – it’s also true that no one had done it before. A stunt can also be science. Warwick admits that he wasn’t doing

address diseases like Parkinson’s, first for monitoring but eventually, perhaps, for treatment. Thousands of others have followed Warwick’s lead, not using electrodes but RFID chips, having them embedded under their skin to tap to pay at the till or open doors. So far, with a few notable exceptions of

ability to ‘hear’ Wi-Fi, there are plenty of DIY cyborgs shoving magnets under their skin, installing USB drives in place of missing fingers, implanting RFID chips into fingers to hold payment cards and ticket data, and wearing belly-button piercings that vibrate when you face true north, for those easily

, and automated parcel delivery. In 2005, while buildings were still being planned in Songdo, Kim promised a world organised around a cutting-edge new technology: RFID cards. As we saw in the chapter on cyborg technology, radio frequency identification is the wizardry that lets you wave a card with an embedded

the inherent problem with building a smart city: the ‘smarts’ are often out of date before anyone moves in. The streetside computers, video conferencing and RFID tags that sounded cutting-edge when Songdo was first planned are useless now that we have smartphones in our pockets. Digs about zombies and out

just call our iPhones and Androids what they are: phones. Yes, they’re so much more. But slapping sensors on to lamp posts and using RFID cards for transport passes doesn’t make a city ‘smart’ or ‘intelligent’ or ‘advanced’; it’s just one way to fight air pollution or encourage

Neil Harbisson and colourblindness here origins of the term ‘cyborg’ here pacemakers here Peter Scott-Morgan and ALS treatment here prosthetics and bionic technology here RFID chips here, here, here Utah Array/BrainGate implant here, here William House and cochlear implants here Cyc AGI here da Vinci, Leonardo here, here Daimler

bionic technology here Prototype This! TV programme here Qualcomm here Quigg, Doc here radio here, here, here Radio Corporation America (RCA) here radio frequency identification (RFID) here Raibert, Marc here, here RAND (Office of Scientific Research and Development) here RAND Corporation here Rander, Peter here Ratio Club here Reflection Technologies Inc

(RTI) here the Register here, here Reichardt, Jasia here Reiter, Reinhold here RFID chips here, here, here Richards, William here Rio de Janeiro, Brazil here Rising Sun film (1993) here Rizzo, Skip here Roach, Ron here Road Research

Future Files: A Brief History of the Next 50 Years

by Richard Watson  · 1 Jan 2008

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

by Bruce Schneier  · 2 Mar 2015  · 598pp  · 134,339 words

Smart Mobs: The Next Social Revolution

by Howard Rheingold  · 24 Dec 2011

For the Win

by Cory Doctorow  · 11 May 2010  · 624pp  · 180,416 words

The New Digital Age: Transforming Nations, Businesses, and Our Lives

by Eric Schmidt and Jared Cohen  · 22 Apr 2013  · 525pp  · 116,295 words

Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia

by Anthony M. Townsend  · 29 Sep 2013  · 464pp  · 127,283 words

Digital Bank: Strategies for Launching or Becoming a Digital Bank

by Chris Skinner  · 27 Aug 2013  · 329pp  · 95,309 words

Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

by Julia Angwin  · 25 Feb 2014  · 422pp  · 104,457 words

No Ordinary Disruption: The Four Global Forces Breaking All the Trends

by Richard Dobbs and James Manyika  · 12 May 2015  · 389pp  · 87,758 words

Radicals Chasing Utopia: Inside the Rogue Movements Trying to Change the World

by Jamie Bartlett  · 12 Jun 2017  · 390pp  · 109,870 words

Rebooting India: Realizing a Billion Aspirations

by Nandan Nilekani  · 4 Feb 2016  · 332pp  · 100,601 words

The Cultural Logic of Computation

by David Golumbia  · 31 Mar 2009  · 268pp  · 109,447 words

Freedom

by Daniel Suarez  · 17 Dec 2009  · 427pp  · 112,549 words

Making a Killing: The Deadly Implications of the Counterfeit Drug Trade

by Roger Bate  · 25 Jun 2008  · 116pp  · 32,712 words

The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences

by Rob Kitchin  · 25 Aug 2014

Smart Cities, Digital Nations

by Caspar Herzberg  · 13 Apr 2017

The Filter Bubble: What the Internet Is Hiding From You

by Eli Pariser  · 11 May 2011  · 274pp  · 75,846 words

I Live in the Future & Here's How It Works: Why Your World, Work, and Brain Are Being Creatively Disrupted

by Nick Bilton  · 13 Sep 2010  · 236pp  · 77,098 words

Bank 3.0: Why Banking Is No Longer Somewhere You Go but Something You Do

by Brett King  · 26 Dec 2012  · 382pp  · 120,064 words

50 Future Ideas You Really Need to Know

by Richard Watson  · 5 Nov 2013  · 219pp  · 63,495 words

The Future of the Internet: And How to Stop It

by Jonathan Zittrain  · 27 May 2009  · 629pp  · 142,393 words

Designing Search: UX Strategies for Ecommerce Success

by Greg Nudelman and Pabini Gabriel-Petit  · 8 May 2011

Cities Under Siege: The New Military Urbanism

by Stephen Graham  · 30 Oct 2009  · 717pp  · 150,288 words

Getting Started with RStudio

by John Verzani  · 18 Sep 2011  · 99pp  · 19,884 words

Programming Android

by Zigurd Mednieks, Laird Dornin, G. Blake Meike and Masumi Nakamura  · 15 Jul 2011

The Curse of Cash

by Kenneth S Rogoff  · 29 Aug 2016  · 361pp  · 97,787 words

Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet

by Joseph Menn  · 26 Jan 2010  · 362pp  · 86,195 words

Rise of the Robots: Technology and the Threat of a Jobless Future

by Martin Ford  · 4 May 2015  · 484pp  · 104,873 words

Stacy Mitchell

by Big-Box Swindle The True Cost of Mega-Retailers and the Fight for America's Independent Businesses (2006)

Hacking Capitalism

by Söderberg, Johan; Söderberg, Johan;

Data and the City

by Rob Kitchin,Tracey P. Lauriault,Gavin McArdle  · 2 Aug 2017

Human + Machine: Reimagining Work in the Age of AI

by Paul R. Daugherty and H. James Wilson  · 15 Jan 2018  · 523pp  · 61,179 words

The Best Interface Is No Interface: The Simple Path to Brilliant Technology (Voices That Matter)

by Golden Krishna  · 10 Feb 2015  · 271pp  · 62,538 words

Halting State

by Charles Stross  · 9 Jul 2011  · 350pp  · 107,834 words

Zero History

by William Gibson  · 6 Sep 2010  · 457pp  · 112,439 words

Big Data at Work: Dispelling the Myths, Uncovering the Opportunities

by Thomas H. Davenport  · 4 Feb 2014

The Stack: On Software and Sovereignty

by Benjamin H. Bratton  · 19 Feb 2016  · 903pp  · 235,753 words

Addiction by Design: Machine Gambling in Las Vegas

by Natasha Dow Schüll  · 15 Jan 2012  · 632pp  · 166,729 words

Delete: The Virtue of Forgetting in the Digital Age

by Viktor Mayer-Schönberger  · 1 Jan 2009  · 263pp  · 75,610 words

Platform Revolution: How Networked Markets Are Transforming the Economy--And How to Make Them Work for You

by Sangeet Paul Choudary, Marshall W. van Alstyne and Geoffrey G. Parker  · 27 Mar 2016  · 421pp  · 110,406 words

Mastering Blockchain, Second Edition

by Imran Bashir  · 28 Mar 2018

Addiction by Design: Machine Gambling in Las Vegas

by Natasha Dow Schüll  · 19 Aug 2012

RDF Database Systems: Triples Storage and SPARQL Query Processing

by Olivier Cure and Guillaume Blin  · 10 Dec 2014

The Secret War Between Downloading and Uploading: Tales of the Computer as Culture Machine

by Peter Lunenfeld  · 31 Mar 2011  · 239pp  · 56,531 words

Masters of Scale: Surprising Truths From the World's Most Successful Entrepreneurs

by Reid Hoffman, June Cohen and Deron Triff  · 14 Oct 2021  · 309pp  · 96,168 words

The Lonely Century: How Isolation Imperils Our Future

by Noreena Hertz  · 13 May 2020  · 506pp  · 133,134 words

MacroWikinomics: Rebooting Business and the World

by Don Tapscott and Anthony D. Williams  · 28 Sep 2010  · 552pp  · 168,518 words

Amazon Unbound: Jeff Bezos and the Invention of a Global Empire

by Brad Stone  · 10 May 2021  · 569pp  · 156,139 words

The Age of Surveillance Capitalism

by Shoshana Zuboff  · 15 Jan 2019  · 918pp  · 257,605 words

The Numerati

by Stephen Baker  · 11 Aug 2008  · 265pp  · 74,000 words

Mobile First

by Luke Wroblewski  · 4 Oct 2011  · 95pp  · 23,041 words

Lab Rats: How Silicon Valley Made Work Miserable for the Rest of Us

by Dan Lyons  · 22 Oct 2018  · 252pp  · 78,780 words

The Wide Lens: What Successful Innovators See That Others Miss

by Ron Adner  · 1 Mar 2012  · 265pp  · 70,788 words

The Economic Singularity: Artificial Intelligence and the Death of Capitalism

by Calum Chace  · 17 Jul 2016  · 477pp  · 75,408 words

Radical Technologies: The Design of Everyday Life

by Adam Greenfield  · 29 May 2017  · 410pp  · 119,823 words

The Future of Technology

by Tom Standage  · 31 Aug 2005

The Great Fragmentation: And Why the Future of All Business Is Small

by Steve Sammartino  · 25 Jun 2014  · 247pp  · 81,135 words

Little Brother

by Cory Doctorow  · 29 Apr 2008  · 398pp  · 120,801 words

The Truth Machine: The Blockchain and the Future of Everything

by Paul Vigna and Michael J. Casey  · 27 Feb 2018  · 348pp  · 97,277 words

When Things Start to Think

by Neil A. Gershenfeld  · 15 Feb 1999  · 238pp  · 46 words

Age of Context: Mobile, Sensors, Data and the Future of Privacy

by Robert Scoble and Shel Israel  · 4 Sep 2013  · 202pp  · 59,883 words

Thinking Machines: The Inside Story of Artificial Intelligence and Our Race to Build the Future

by Luke Dormehl  · 10 Aug 2016  · 252pp  · 74,167 words

Wired for War: The Robotics Revolution and Conflict in the 21st Century

by P. W. Singer  · 1 Jan 2010  · 797pp  · 227,399 words

DeFi and the Future of Finance

by Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro, Vitalik Buterin and Fred Ehrsam  · 23 Aug 2021  · 179pp  · 42,081 words

Augmented: Life in the Smart Lane

by Brett King  · 5 May 2016  · 385pp  · 111,113 words

The Last Dance

by Martin L. Shoemaker  · 2 Nov 2019  · 485pp  · 149,337 words

X-T3 user guide

by FUJIFILM Corporation  · 10 May 2019

The Internet of Us: Knowing More and Understanding Less in the Age of Big Data

by Michael P. Lynch  · 21 Mar 2016  · 230pp  · 61,702 words

The Biggest Bluff: How I Learned to Pay Attention, Master Myself, and Win

by Maria Konnikova  · 22 Jun 2020  · 377pp  · 117,339 words

The Mesh: Why the Future of Business Is Sharing

by Lisa Gansky  · 14 Oct 2010  · 215pp  · 55,212 words

Lessons from the Titans: What Companies in the New Economy Can Learn from the Great Industrial Giants to Drive Sustainable Success

by Scott Davis, Carter Copeland and Rob Wertheimer  · 13 Jul 2020  · 372pp  · 101,678 words

The Great Race: The Global Quest for the Car of the Future

by Levi Tillemann  · 20 Jan 2015  · 431pp  · 107,868 words

Places of the Heart: The Psychogeography of Everyday Life

by Colin Ellard  · 14 May 2015  · 313pp  · 92,053 words

Priceless: The Myth of Fair Value (And How to Take Advantage of It)

by William Poundstone  · 1 Jan 2010  · 519pp  · 104,396 words

Half Empty

by David Rakoff  · 20 Sep 2010  · 181pp  · 62,775 words

If Mayors Ruled the World: Dysfunctional Nations, Rising Cities

by Benjamin R. Barber  · 5 Nov 2013  · 501pp  · 145,943 words

Liars and Outliers: How Security Holds Society Together

by Bruce Schneier  · 14 Feb 2012  · 503pp  · 131,064 words

To Serve God and Wal-Mart: The Making of Christian Free Enterprise

by Bethany Moreton  · 15 May 2009  · 391pp  · 22,799 words

Terms of Service: Social Media and the Price of Constant Connection

by Jacob Silverman  · 17 Mar 2015  · 527pp  · 147,690 words

Sixty Days and Counting

by Kim Stanley Robinson  · 27 Feb 2007  · 526pp  · 155,174 words

The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future

by Kevin Kelly  · 6 Jun 2016  · 371pp  · 108,317 words

What's Mine Is Yours: How Collaborative Consumption Is Changing the Way We Live

by Rachel Botsman and Roo Rogers  · 2 Jan 2010  · 411pp  · 80,925 words

Triumph of the City: How Our Greatest Invention Makes Us Richer, Smarter, Greener, Healthier, and Happier

by Edward L. Glaeser  · 1 Jan 2011  · 598pp  · 140,612 words

Aerotropolis

by John D. Kasarda and Greg Lindsay  · 2 Jan 2009  · 603pp  · 182,781 words

To Be a Machine: Adventures Among Cyborgs, Utopians, Hackers, and the Futurists Solving the Modest Problem of Death

by Mark O'Connell  · 28 Feb 2017  · 252pp  · 79,452 words

Big Data Analytics: Turning Big Data Into Big Money

by Frank J. Ohlhorst  · 28 Nov 2012  · 133pp  · 42,254 words

Competing on Analytics: The New Science of Winning

by Thomas H. Davenport and Jeanne G. Harris  · 6 Mar 2007  · 233pp  · 67,596 words

Jony Ive: The Genius Behind Apple's Greatest Products

by Leander Kahney  · 14 Nov 2013  · 363pp  · 94,139 words

Content: Selected Essays on Technology, Creativity, Copyright, and the Future of the Future

by Cory Doctorow  · 15 Sep 2008  · 189pp  · 57,632 words

The Road to Ruin: The Global Elites' Secret Plan for the Next Financial Crisis

by James Rickards  · 15 Nov 2016  · 354pp  · 105,322 words

Information: A Very Short Introduction

by Luciano Floridi  · 25 Feb 2010  · 137pp  · 36,231 words

Confronting Gun Violence in America

by Thomas Gabor  · 12 Sep 2016

Raw Data Is an Oxymoron

by Lisa Gitelman  · 25 Jan 2013

The Costs of Connection: How Data Is Colonizing Human Life and Appropriating It for Capitalism

by Nick Couldry and Ulises A. Mejias  · 19 Aug 2019  · 458pp  · 116,832 words

Total Recall: How the E-Memory Revolution Will Change Everything

by Gordon Bell and Jim Gemmell  · 15 Feb 2009  · 291pp  · 77,596 words

Imaginable: How to See the Future Coming and Feel Ready for Anything―Even Things That Seem Impossible Today

by Jane McGonigal  · 22 Mar 2022  · 420pp  · 135,569 words

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

by Andy Greenberg  · 5 Nov 2019  · 363pp  · 105,039 words

The Dark Cloud: How the Digital World Is Costing the Earth

by Guillaume Pitron  · 14 Jun 2023  · 271pp  · 79,355 words

This Is Service Design Doing: Applying Service Design Thinking in the Real World: A Practitioners' Handbook

by Marc Stickdorn, Markus Edgar Hormess, Adam Lawrence and Jakob Schneider  · 12 Jan 2018  · 704pp  · 182,312 words

Mexico City Street Food: A Travel Guide for the Curious Eater. How to Safely Enjoy the Delicious Foods From the Street Vendors of Mexico City.

by Ron Upshaw  · 24 Nov 2015  · 37pp  · 10,904 words

Wanderers: A Novel

by Chuck Wendig  · 1 Jul 2019  · 1,028pp  · 267,392 words

Free Money for All: A Basic Income Guarantee Solution for the Twenty-First Century

by Mark Walker  · 29 Nov 2015

Demystifying Smart Cities

by Anders Lisdorf

The Charisma Machine: The Life, Death, and Legacy of One Laptop Per Child

by Morgan G. Ames  · 19 Nov 2019  · 426pp  · 117,775 words

The Future Is Faster Than You Think: How Converging Technologies Are Transforming Business, Industries, and Our Lives

by Peter H. Diamandis and Steven Kotler  · 28 Jan 2020  · 501pp  · 114,888 words

The Controlled Demolition of the American Empire

by Jeff Berwick and Charlie Robinson  · 14 Apr 2020  · 491pp  · 141,690 words

The Pirate's Dilemma: How Youth Culture Is Reinventing Capitalism

by Matt Mason

Rule of the Robots: How Artificial Intelligence Will Transform Everything

by Martin Ford  · 13 Sep 2021  · 288pp  · 86,995 words

The Everything Store: Jeff Bezos and the Age of Amazon

by Brad Stone  · 14 Oct 2013  · 380pp  · 118,675 words

We Are the Nerds: The Birth and Tumultuous Life of Reddit, the Internet's Culture Laboratory

by Christine Lagorio-Chafkin  · 1 Oct 2018

Ghost Fleet: A Novel of the Next World War

by P. W. Singer and August Cole  · 28 Jun 2015  · 537pp  · 149,628 words

The Transhumanist Reader

by Max More and Natasha Vita-More  · 4 Mar 2013  · 798pp  · 240,182 words

Data Mining: Concepts, Models, Methods, and Algorithms

by Mehmed Kantardzić  · 2 Jan 2003  · 721pp  · 197,134 words

Postcapitalism: A Guide to Our Future

by Paul Mason  · 29 Jul 2015  · 378pp  · 110,518 words

Hype: How Scammers, Grifters, and Con Artists Are Taking Over the Internet―and Why We're Following

by Gabrielle Bluestone  · 5 Apr 2021  · 329pp  · 100,162 words

Beyond: Our Future in Space

by Chris Impey  · 12 Apr 2015  · 370pp  · 97,138 words

What to Think About Machines That Think: Today's Leading Thinkers on the Age of Machine Intelligence

by John Brockman  · 5 Oct 2015  · 481pp  · 125,946 words

Geek Heresy: Rescuing Social Change From the Cult of Technology

by Kentaro Toyama  · 25 May 2015  · 494pp  · 116,739 words

Daemon

by Daniel Suarez  · 1 Dec 2006  · 562pp  · 146,544 words

The Ministry for the Future: A Novel

by Kim Stanley Robinson  · 5 Oct 2020  · 583pp  · 182,990 words

Retirementology: Rethinking the American Dream in a New Economy

by Gregory Brandon Salsbury  · 15 Mar 2010  · 261pp  · 70,584 words

City: A Guidebook for the Urban Age

by P. D. Smith  · 19 Jun 2012

Ten Billion Tomorrows: How Science Fiction Technology Became Reality and Shapes the Future

by Brian Clegg  · 8 Dec 2015  · 315pp  · 92,151 words

Python Requests Essentials

by Rakesh Vidya Chandra and Bala Subrahmanyam Varanasi  · 16 Jun 2015  · 134pp  · 29,488 words

The Zenith Angle

by Bruce Sterling  · 27 Apr 2004  · 342pp  · 95,013 words

Too Big to Know: Rethinking Knowledge Now That the Facts Aren't the Facts, Experts Are Everywhere, and the Smartest Person in the Room Is the Room

by David Weinberger  · 14 Jul 2011  · 369pp  · 80,355 words

Driverless: Intelligent Cars and the Road Ahead

by Hod Lipson and Melba Kurman  · 22 Sep 2016

California

by Sara Benson  · 15 Oct 2010

A Man for All Markets

by Edward O. Thorp  · 15 Nov 2016  · 505pp  · 142,118 words

Clan Corporate

by Stross, Charles  · 28 Aug 2006  · 363pp  · 104,113 words

Iron Sunrise

by Stross, Charles  · 28 Oct 2004  · 462pp  · 142,240 words

Jennifer Morgue

by Stross, Charles  · 12 Jan 2006

Hadoop: The Definitive Guide

by Tom White  · 29 May 2009  · 933pp  · 205,691 words

Statistics hacks

by Bruce Frey  · 9 May 2006  · 755pp  · 121,290 words

The Most Human Human: What Talking With Computers Teaches Us About What It Means to Be Alive

by Brian Christian  · 1 Mar 2011  · 370pp  · 94,968 words

Infonomics: How to Monetize, Manage, and Measure Information as an Asset for Competitive Advantage

by Douglas B. Laney  · 4 Sep 2017  · 374pp  · 94,508 words

Platform Capitalism

by Nick Srnicek  · 22 Dec 2016  · 116pp  · 31,356 words

Intertwingled: Information Changes Everything

by Peter Morville  · 14 May 2014  · 165pp  · 50,798 words

Exponential Organizations: Why New Organizations Are Ten Times Better, Faster, and Cheaper Than Yours (And What to Do About It)

by Salim Ismail and Yuri van Geest  · 17 Oct 2014  · 292pp  · 85,151 words

Live Work Work Work Die: A Journey Into the Savage Heart of Silicon Valley

by Corey Pein  · 23 Apr 2018  · 282pp  · 81,873 words

The Battery: How Portable Power Sparked a Technological Revolution

by Henry Schlesinger  · 16 Mar 2010  · 336pp  · 92,056 words

The Airbnb Story: How Three Ordinary Guys Disrupted an Industry, Made Billions...and Created Plenty of Controversy

by Leigh Gallagher  · 14 Feb 2017  · 290pp  · 87,549 words

Democracy and Prosperity: Reinventing Capitalism Through a Turbulent Century

by Torben Iversen and David Soskice  · 5 Feb 2019  · 550pp  · 124,073 words

Infinite Detail

by Tim Maughan  · 1 Apr 2019  · 303pp  · 81,071 words

Fully Automated Luxury Communism

by Aaron Bastani  · 10 Jun 2019  · 280pp  · 74,559 words

Python Network Programming Cookbook

by M. Omar Faruque Sarker  · 15 Feb 2014  · 234pp  · 57,267 words

Life Inc.: How the World Became a Corporation and How to Take It Back

by Douglas Rushkoff  · 1 Jun 2009  · 422pp  · 131,666 words

Robots Will Steal Your Job, But That's OK: How to Survive the Economic Collapse and Be Happy

by Pistono, Federico  · 14 Oct 2012  · 245pp  · 64,288 words

USA Travel Guide

by Lonely, Planet

The Rights of the People

by David K. Shipler  · 18 Apr 2011  · 495pp  · 154,046 words

The Fourth Industrial Revolution

by Klaus Schwab  · 11 Jan 2016  · 179pp  · 43,441 words

Throwing Rocks at the Google Bus: How Growth Became the Enemy of Prosperity

by Douglas Rushkoff  · 1 Mar 2016  · 366pp  · 94,209 words

Machine Learning: New and Collected Stories

by Hugh Howey  · 2 Oct 2017  · 339pp  · 105,856 words

The Wealth of Networks: How Social Production Transforms Markets and Freedom

by Yochai Benkler  · 14 May 2006  · 678pp  · 216,204 words

The Zero Marginal Cost Society: The Internet of Things, the Collaborative Commons, and the Eclipse of Capitalism

by Jeremy Rifkin  · 31 Mar 2014  · 565pp  · 151,129 words

Tech Titans of China: How China's Tech Sector Is Challenging the World by Innovating Faster, Working Harder, and Going Global

by Rebecca Fannin  · 2 Sep 2019  · 269pp  · 70,543 words

Human Compatible: Artificial Intelligence and the Problem of Control

by Stuart Russell  · 7 Oct 2019  · 416pp  · 112,268 words

Smart Machines: IBM's Watson and the Era of Cognitive Computing (Columbia Business School Publishing)

by John E. Kelly Iii  · 23 Sep 2013  · 118pp  · 35,663 words

The Gig Economy: A Critical Introduction

by Jamie Woodcock and Mark Graham  · 17 Jan 2020  · 207pp  · 59,298 words

Paintwork

by Tim Maughan  · 28 Jul 2011  · 106pp  · 30,173 words

Windfall: The Booming Business of Global Warming

by Mckenzie Funk  · 22 Jan 2014  · 337pp  · 101,281 words

The Smartphone Society

by Nicole Aschoff

User Friendly: How the Hidden Rules of Design Are Changing the Way We Live, Work & Play

by Cliff Kuang and Robert Fabricant  · 7 Nov 2019

Everything Is Obvious: *Once You Know the Answer

by Duncan J. Watts  · 28 Mar 2011  · 327pp  · 103,336 words

The Future Is Analog: How to Create a More Human World

by David Sax  · 15 Jan 2022  · 282pp  · 93,783 words